Real-Time (Paradigms) (51)



Similar documents
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Random Access Protocols

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Ring Local Area Network. Ring LANs

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Module 15: Network Structures

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Chapter 14: Distributed Operating Systems

Chapter 16: Distributed Operating Systems

How To Make A Multi-User Communication Efficient

Communication Networks. MAP-TELE 2011/12 José Ruela

Performance Evaluation of Wired and Wireless Local Area Networks

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Computer Networks Vs. Distributed Systems

Controlled Random Access Methods

2 Basic Concepts. Contents

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

CS263: Wireless Communications and Sensor Networks

Wireless LAN Concepts

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Algorithms for Interference Sensing in Optical CDMA Networks

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Real-Time Systems Hermann Härtig Real-Time Communication (following Kopetz, Liu, Schönberg, Löser)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

MANAGEMENT INFORMATION SYSTEMS 8/E

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

CSCI 362 Computer and Network Security

EPL 657 Wireless Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Industrial Networks & Databases

Ethernet, VLAN, Ethernet Carrier Grade

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic

Data Link Layer. Page 1. Ethernet

MAC Algorithms in Wireless Networks

an interconnected collection of autonomous computers interconnected = able to exchange information

QoS issues in Voice over IP

Lecture 7 Multiple Access Protocols and Wireless

Introduction to Ethernet

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III


Adaptive DCF of MAC for VoIP services using IEEE networks

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

Top-Down Network Design

... neither PCF nor CA used in practice

Fiber Distributed Data Interface

CSE 123A Computer Networks

Customer Specific Wireless Network Solutions Based on Standard IEEE

Computer Networks CS321

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

524 Computer Networks

ECE 333: Introduction to Communication Networks Fall 2002

Lecture 17: Wireless Networking"

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CSE 3461 / 5461: Computer Networking & Internet Technologies

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

IT4405 Computer Networks (Compulsory)

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

CSMA/CA. Information Networks p. 1

CSC 313 Data Communications COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION COURSE OBJECTIVES

Computer Networks: LANs, WANs The Internet

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Chapter 6: Medium Access Control Layer

19 Comparison of Ethernet Systems

Computer Networking: A Survey

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

Network Topologies. Network Topologies

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

High-Level Data Link Control

Real-Time (Paradigms) (70)

DATA COMMUNICATION AND NETWORKS

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Local Area Networks (LANs) Blueprint (May 2012 Release)

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

RTT 60.5 msec receiver window size: 32 KB

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Wireless Personal Area Networks (WPANs)

Transcription:

Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller <--> Controller Major challenge in real-time communication: The communication delay adds to the computer response time. ---> the delay has to be bounded and to be known, even in the presence of disturbing factors such as other (RT) traffic, variable load, or faults Different goals ---> different key performance measure In non-real-time systems: Throughput In real-time systems: Guarantee (high probability) of delivery of a single message within a certain deadline 11

Real-Time (Paradigms) (51a) Classes of real-time network traffic, each characterized by the following parameters: by deadline: Hard real-time: deadline of message related to deadline of tasks Multimedia: deadline of messages application-dependant by priority: Defines which messages are transferred first In overload situations low priority messages are dropped Priority not necessarily related to the importance of a message (see Rate Monotonic Scheduling) by arrival pattern: Constant rate: fixed size packets at periodic interval (Example: sensor data) Variable rate: variable size packets and/or irregular interval (Example: voice or video data) Character of traffic might change while traveling through multiple hops in the network: a) two classes competing at a node b) High priority, bursty c) Low priority, constant d) Resulting traffic 12

Real-Time (Paradigms) (51b) Architectural issue Hard RT systems are often designed with dedicated Network Processor (NP). Main functions of a NP: Execute operations necessary to deliver a message from a source to its destinations. establish connections between source and destination nodes handle end-to-end error detection and message retransmission routing (select primary and alternative routes) allocate bandwidths necessary to guarantee timely delivery packetize information into data blocks and reassembling at the destination implement buffer management policies monitor the state of the network Pros: Reduced overhead by dedicated processor running the protocols. Minimized interference between CPU-scheduling of the application and network traffic (in most cases network traffic is asynchronous to the local CPU-scheduling introducing unpredictability by spontaneous interrupts) Fault-tolerance mechanisms (Redundancy: message replication, multiple independent networks links, site-fault detection) can be implemented orthogonal to the application 13

Real-Time (Paradigms) (51c) Description of a real-time communication protocol system 7 Layer ISO OSI reference model: 1) Physical Layer Network medium (copper, fiber, wireless) Network topology (bus, ring, star, mesh, point-to-point ) Bit-encoding 2) Data-Link Layer Medium access control Logical Link Layer (Frame-encoding, Acknowledgements, Error and Flow Control) 3) Network Layer 4) Transport Layer 5) Session Layer 6) Presentation Layer 7) Application Layer (Semantics of Data : application specific profiles (sensor data, actor parameter)) MAC is the decisive factor when designing RT communication protocols with Ethernet as de facto standard for LAN s Is Ethernet suitable for Real-Time? No, because CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is inherently not time-bounded. Why? 14

Real-Time (Paradigms) (52) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (like Ethernet) among competing users CSMA protocols All the nodes can monitor the communication channel and can check whether it is busy or idle (This means carrier sense). If a node observes that the channel is busy, it refrains from sending in order not to interfere (collide). CSMA is a truly distributed algorithm, with each node deciding when to transmit ---> collisions are still possible, must be detected, but should be avoided ---> CSMA/CD protocols like Ethernet. Example case of a collision in a bus network There are various types of CSMA, differing in how to compute the time until trying a send again if the medium is busy. 15

Real-Time (Paradigms) (53) Types of CSMA protocols 1-persistent Behavior: When a station has data to send, it transmits with a probability of 1 whenever it finds the channel idle. If the channel is busy, the station waits until it becomes idle (greedy approach). nonpersistent Behavior: It differs from 1-persistent w.r.t. the case where the channel is busy.then, the station deliberately waits a random period of time before sensing the channel again. p-persistent (applies to slotted channels) Behavior: When a station has data to send, it transmits with a probability of p whenever it finds the channel idle. With a probability of q = 1- p it defers until the next slot and the same procedure iterates. If the channel has become busy meanwhile, the station waits a random time and starts again.if the channel is busy when first sensing it, the station waits until the next slot and repeats the procedure. 16

Comparison of channel utilization versus load : Real-Time (Paradigms) (54) ---> CSMA/CD protocols are not suitable for Real-Time because they cannot be time-bounded! 17

Examples of real-time communication systems Real-Time (Paradigms) (55) Timed-Token Protocol Physical medium: Bus or ring on any medium Example of a typical ring structure Basic algorithm for accessing the medium: A token is a grant of permission to a node to transmit its packets on the network. When the token-holding node completes its transmission, it surrenders the token to another node. A node is only permitted to transmit on the network if it currently holds the token. The token is passed along a logical ring of all participating nodes. Key parameter TTRT (target token rotation time): Upper bound for the cycle time of the token which is defined as : The time it takes for the token to make a complete circuit around the nodes of the ring. 18

Real-Time (Paradigms) (56) Basic idea of the protocol: If each node i (of overall n nodes) holds the token for a fraction f i of TTRT, with n i= i f i TTRT TTRT it is guaranteed that each node can send real-time messages up to a certain amount of time (f i TTRT) each TTRT time units. This is a simple protocol, that fulfils hard real-time requirements and is efficient as long as each node has to send only real-time traffic (constant or bounded rate), i..e. the fraction defined above represents only the real-time traffic. Extension of the protocol to allow for mixed real-time and non-real-time traffic ( synchronous and asynchronous packets ) The token is called late, if the time since its previous arrival time at the same node (i.e. the actual cycle time) is greater than TTRT. The token may become late if the transmission of an asynchronous packet delays the token rotation. 19

Real-Time (Paradigms) (57) Analysis of the Timed-Token Protocol Claim: Even with this extension the protocol still provides predictable timing behavior, the token-cycle time is bounded (in contrast to CSMA) Theorem 1: In the absence of failures, the maximum cycle time of the token is not greater than twice the TTRT. Proof: Let (a, b) the ath visit of the token to node b, t(a,b) the time when the token leaves at (a,b), C(a,b) = t(a,b) - t(a-1, b) the ath token-cycle time as seen by b 20

Real-Time (Paradigms) (58) S(a, b) the time for transmitting the synchronous packets at (a, b) A(a, b) the time for transmitting the asynchronous packets at (a, b) Case 1: The token was not late during the entire cycle preceding visit (a, b) => C(a, b) < TTRT Case 2: The token was always late during the entire cycle preceding visit (a, b) => during C(a, b) only synchronous traffic is transmitted => two consecutive cycles cannot have a time greater TTRT 21

Real-Time (Paradigms) (58b) Case 3: The token was not late for a part of the cycle preceding (a, b). (j, k) was the visit preceding (a, b) were the token was not late the last time. Since the token was early at t(j, k): C(j, k) <= TTRT The token is late over the interval L (only synchronous traffic allowed): 22